Sciweavers

2016 search results - page 57 / 404
» Some observations on HC-128
Sort
View
JSA
1998
94views more  JSA 1998»
13 years 9 months ago
Trading computing power with ReGTime
ReGTime1 (Rent Giga ops someTimes) is a software package for an envisioned \computing power market". ReGTime helps customers to search for providers who allow their workstati...
Bernd Dreier, Annja Huber, Theo Ungerer, Markus Za...
ECTEL
2010
Springer
13 years 8 months ago
Who Students Interact With? A Social Network Analysis Perspective on the Use of Twitter in Language Learning
Abstract. This paper reports student interaction patterns and self-reported results of using Twitter microblogging environment. The study employs longitudinal probabilistic social ...
Carsten Ullrich, Kerstin Borau, Karen Stepanyan
MANSCI
2010
92views more  MANSCI 2010»
13 years 8 months ago
A Quantitative Measurement of Regret Theory
This paper introduces a choice-based method that for the first time makes it possible to quantitatively measure regret theory, one of the most popular models of decision under unc...
Han Bleichrodt, Alessandra Cillo, Enrico Diecidue
ACIVS
2010
Springer
13 years 8 months ago
Projection Selection Algorithms for Discrete Tomography
In this paper we study how the choice of projection angles affect the quality of the discrete tomographic reconstruction of an object. We supply four different strategies for selec...
László Varga, Péter Bal&aacut...
EVOW
2009
Springer
13 years 7 months ago
Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming
An ever-present problem in intrusion detection technology is how to construct the patterns of (good, bad or anomalous) behaviour upon which an engine have to make decisions regardi...
Agustín Orfila, Juan M. Estévez-Tapi...